SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    One system, one card
    One system, one card
    Hikvision AOV 4G Solar Camera Series for Off-Grid Video Security

    Hikvision AOV 4G Solar Camera Series for Off-Grid Video Security

    KentixONE – IoT Access and Monitoring For Data Centres

    KentixONE – IoT Access and Monitoring For Data Centres

    Climax Technology HSGW-Gen3 Modular Smart Security Gateway

    Climax Technology HSGW-Gen3 Modular Smart Security Gateway

    Delta Scientific DSC50 ‘S’ Barrier: Portable, Crash-Rated Vehicle Mitigation Solution

    Delta Scientific DSC50 ‘S’ Barrier: Portable, Crash-Rated Vehicle Mitigation Solution

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    One system, one card
    One system, one card
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Alibaba's Wan2.6 series revolutionises AI video content
    • AI agents revolutionising video surveillance by 2026
    • Matrix Comsec: CII industrial innovation award winner
    • AI & cybersecurity in 2026: i-PRO insights
    One system, one card
    One system, one card
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    Featured
    • Which vertical markets have the greatest growth potential for security?
    • What’s behind (perimeter) door #1?
    • Louvre heist exposes security gaps: How smarter security could have prevented a $100 million theft
    • Why open matters in the age of AI
    One system, one card
    One system, one card
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    One system, one card
    One system, one card
    Marin Hospital enhances security with eCLIQ access control

    Marin Hospital enhances security with eCLIQ access control

    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    One system, one card
    One system, one card
    Intersec Dubai 2026

    Intersec Dubai 2026

    DIMDEX 2026

    DIMDEX 2026

    DISTRIBUTECH International 2026

    DISTRIBUTECH International 2026

    Munich Security Conference (MSC) 2026

    Munich Security Conference (MSC) 2026

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • Wire-free locks
  • AI special report
  • Cyber security special report
  • Casino security & surveillance
  • 6
Cloud security
  • Home
  • About
  • White papers
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • Videos

Check out our special report on casino security

Get it now!

Rubrik unveils cyber recovery tool to take uncertainty out of ransomware recovery

17 Nov 2022

Rubrik unveils cyber recovery tool to take uncertainty out of ransomware recovery
Contact company
Contact Rubrik, Inc.
icon Add as a preferred source Download PDF version
Related Links
  • Rubrik joins Microsoft Intelligent Security Association; announces integration with Microsoft Sentinel to deliver multi-cloud data security
  • Egnyte appoints Johnna Bowley as Vice President of Global Channel Sales and Go-To-Market
  • Rubrik releases research study - ‘The State of Data Security’ that reveals one-third of enterprises forced to change leadership due to a cyber-attack

Rubrik, the Zero Trust Data Security™ Company announced Rubrik Cyber Recovery to help organisations improve their cyber readiness and recover faster with confidence. Available as part of Rubrik Security Cloud, Rubrik Cyber Recovery delivers two new capabilities to help organisations better prepare for attacks and minimise operational downtime.

It provides a simple way to test, validate, and document the success of an organisation’s cyber recovery plans. It also provides businesses a way to instantly recover the last known clean copy of data into production while performing forensic investigations out-of-band in an isolated recovery environment.

Report findings 

Organisations are struggling to prepare for and respond to increasingly inevitable ransomware attacks and other cyber incidents. According to the inaugural State of Data Security Report from Rubrik Zero Labs, 92% of global IT and Security leaders are concerned they are unable to maintain business continuity during an attack.

In addition, the report found that a third of boards have little to no confidence in their organisation’s ability to recover critical data and business applications in the event of a cyberattack.

Testing recovery plans

With Rubrik, we can prepare, verify our preparation with auditors, and safely recover in the event of a cyberattack"

Organisations currently need a simple way to quickly test recovery plans and investigate threats without delaying the restoration of business-critical operations. “It’s essential that we have confidence in our data recovery plan,” said Dan Gallivan, Director of IT at Payette, an award-winning architecture firm.

“With Rubrik, we can now prepare, verify our preparation with auditors, and safely recover in the event of a cyberattack. This peace of mind is critical not just for our IT and Security teams, but the organisation as a whole.”

Features 

Rubrik Cyber Recovery empowers IT and security teams to:

  • Validate Whether Cyber Recovery Plans Will Work: Rubrik Cyber Recovery enables customers to easily test, validate, and document the success of their cyber recovery plans while tracking performance metrics to ensure their organisation is prepared to meet recovery SLAs. Customers can test whether their recovery playbook works, including sequence, timing, and failure points. They can download reports about recovery performance on-demand to prove that regular testing of cyber recovery capabilities is taking place.
  • Clone Backup Snapshots For Faster Security Testing: Rubrik Cyber Recovery enables organisations to assess cyber readiness faster through the ability to quickly clone snapshots into isolated environments. This allows customers to perform destructive tests more easily, thereby enhancing their organisation’s cyber readiness.
  • Conduct Forensic Investigations in Parallel to Recovery: Rubrik Cyber Recovery allows organisations to conduct forensic investigations on infected snapshots in isolated environments while they restore business continuity quickly using a last known good snapshot. 

Safe and predictable recovery

The advancements in Rubrik Security Cloud continue to strengthen customers' defences in securing their data"

“IT and security teams are faced with increasing pressure to ensure they can recover from a cyberattack, and yet boards and leadership teams lack confidence in their ability to do so,” said Dan Rogers, President of Rubrik.

“Rubrik Cyber Recovery can help boost board and leadership confidence by not only enabling organisations to achieve safer, predictable recovery from cyber events but also enabling IT and Security teams to prove preparedness. These advancements in Rubrik Security Cloud continue to strengthen customers' defences in securing their data.”

Extending data observability support to the cloud

Rubrik also announced both Ransomware Monitoring & Investigation and Sensitive Data Monitoring & Management will support Microsoft OneDrive and SharePoint, NAS Cloud Direct, and Azure Virtual Machines. As a result, organisations can gain more visibility into ransomware impact and sensitive data exposure within high-risk, cloud-based workloads.

Rubrik continues to expand its capabilities to even more cloud workloads, helping customers protect all of their data across the enterprise, cloud, and SaaS. Register for Rubrik Winter Release 2022 virtual event to learn more, with the keynote taking place on Wednesday, November 16 at 10 a.m. PST / 1 p.m. EST. Keynote and breakout sessions will also be available on demand.

Discover how AI, biometrics, and analytics are transforming casino security

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Office surveillance
  • Office security systems
  • Office security
  • Industrial security
  • Commercial security
  • Security management
  • Security installation
  • Security monitoring system
  • Network monitoring
  • Identity management
  • Facility security
  • Institute security
  • Industrial security systems
  • Security software
  • Industrial surveillance
  • Integration software
  • Cyber security
  • Crime prevention
  • Crowd Management
  • Corporate Security
  • Data Security
  • Warning Devices
  • Incident Management
  • Cloud security
  • Related categories
  • CCTV software
Related white papers
Milestone cloud deployment guide

Milestone cloud deployment guide

Download
Maximising enterprise security systems in the cloud

Maximising enterprise security systems in the cloud

Download
Using artificial intelligence (AI) to automate physical security systems

Using artificial intelligence (AI) to automate physical security systems

Download
Related articles
Looking back at 2020: Cloud systems expand in shadow of COVID

Looking back at 2020: Cloud systems expand in shadow of COVID

What is the cloud? (Can we all agree?)

What is the cloud? (Can we all agree?)

Which security markets are likely to embrace the cloud?

Which security markets are likely to embrace the cloud?

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report Casino security & surveillance RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Cloud security
  4. News
  5. Product news
See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
One system, one card
One system, one card
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec